What success looks like in this role:
Key Responsibilities
- Serves as the regional point of contact for security escalations/requests and escalates requests to Security architecture as needed.
- Responsible for the identification, and assessment of enterprise risks. Identifies, evaluates, and tests appropriate security products, tools, and systems to ensure alignment with the CushWake global security posture
- Articulates security policies, guidelines and standards to customers and developers. Able to apply theories, concepts, principles, and methodologies to difficult but conventional assignments. Assignments are given in terms of objectives to be met.
- Works independently within an established framework.
- Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents.
- Implements IS and cyber security policies and takes measures against intrusion, frauds, attacks, or leaks.
- Continues to build knowledge of the organization, processes, and customers. Performs a range of mainly straightforward assignments. Uses prescribed guidelines or policies to analyze and resolve problems. Receives a moderate level of guidance and direction
- Partners with Security Architecture on critical scope delivery
- Reviews security INC(s) to ensure proper processes have been follow and to identify additional IoA(s)/IoC(s).
Serves as the security stakeholder for IR/MIM activities until Security Architecture and/or senior leadership can engage.
#LI-TC1
You will be successful in this role if you have:
All except Home Affairs: • Requires a Bachelor’s degree and a minimum of 8 years’ experience including relevant technical expertise • Requires in-depth knowledge and experience • Solves complex problems; takes a new perspective using existing solutions • Works independently and receives minimal guidance • Acts as a resource for colleagues with less experience Home Affairs: • Minimum of 5 years’ experience, with knowledge of Microsoft Systems Centre Configuration Manager (SCCM) • Microsoft PowerShell • Microsoft Application Virtualization (App-V) • iVanti Application Control • Symantec Anti-Virus and Endpoint Management • Microsoft Office (Word, Excel, PowerPoint, Access and Visio) • Windows 10 and Windows 7 • Security level clearance required FOR EPO (End-point Operations) •8 years’ experience preferred in managing and having knowledge of Microsoft Systems Centre Configuration Manager (SCCM) (out of the 8 years’ experience) •Experience in either one or multiple Workplace Services domains. •Collaboration tools, Systems Management - Software Distribution, Mobility Management, Image and Packaging, End Point Security and latest technologies. •Experience in all Antivirus software and not only on Symantec
Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law.
This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here .